LEHI, UT -- (Marketwire) -- 12/06/12 -- With the large volume of tablet sales expected this holiday season, companies need to be prepared for an influx of devices being connected to data and services on their corporate networks. A clearly written and concise BYOD (bring-your-own-device) policy is the first step in allowing the use of personal devices than can improve productivity while also articulating the expectations regarding the use of personal devices in relation to company assets.

Matrix42, a global leader of physical, mobile and virtual Workplace Management solutions, has provided five key elements of an effective BYOD policy that clearly outlines acceptable use of corporate IT resources on mobile devices and what security controls are expected to be followed. It can create a reasonable balance where employees can connect their devices but within corporate guidelines:

Outline acceptable use - This includes clearly identifying how devices may and may not be used on company time and in connecting to company resources. It also outlines apps, company resources and web sites that may be accessed via a mobile device and functions that may have limitations, such as not allowing the camera to be used on company property.

Approved devices and support - Be as inclusive as possible but also recognize that not all devices may be able to meet your security requirements. Identify which devices and operating systems may be used and detail what type of issues will be supported by the company's IT department.

Measures for securing devices - Employees need to understand that while they may be allowed to access company resources with their personal devices, there is an expectation of maintaining security. List the requirements for having password protection on the device and the amount of idle time that will require a password to be entered before use. Clearly outline the rights of the company to lock, wipe or locate a device if it becomes lost or stolen or upon termination of employment.

Reimbursement policies - It is easy for data charges and/or roaming charges to quickly accumulate on a mobile device. Employees need to understand the level of reimbursement they can expect for hardware costs and call, text and data usage. Be sure to factor in plan overage charges and roaming charges that may be incurred.

Enforcement and liability - A policy does not do much good if it is not enforced. Identify for employees the penalties for not following policy and where the liability lies for things like loss of company or personal data and using a jailbroken or rooted phone. Include a signature section for the employee to acknowledge the policy.

"The Consumer Electronics Association predicts 32 million tablets will be sold at the end of this year, and it is a reasonable expectation that many of those will end up being connected to a corporate network or email account," said Gil Cattelain, director of marketing at Matrix42. "It is imperative that companies are prepared with a BYOD policy that clearly outlines expectations, security measures and enforcement. This creates an understanding between company and employees that balances the cost, productivity and employee satisfaction benefits of BYOD with the need to keep company data and resources secure and uncompromised."

Matrix42 makes it easy to launch a BYOD program that meets the needs of both employees and the company with a mobile device management (MDM) solution that automates the process of tracking, monitoring and managing mobile devices connected to the network. Matrix42 is the only company to integrate MDM with self-service capabilities that allow users to acquire and self-provision their device through the company's service catalog, download approved applications, and access management features such as device location and data wiping.

About Matrix42 Matrix42 is the leading supplier for Workplace Management solutions with seamless management of physical, virtual and mobile environments. It combines Client Lifecycle, Cloud, SaaS, Virtualization and Service Management into a holistic solution enabling users to have transparent access to their data and services everywhere, from any virtual or physical device at any time. Founded in 1992, Matrix42, with headquarters near Salt Lake City and Frankfurt, Germany, has been established in the dynamic IT market for almost 20 years. More than six million clients are managed by Matrix42 software with more than 2,500 customers worldwide.

Technology changes at the speed of light. To say it can be hard to keep up is an understatement. For performance engineers, taking charge of your own continuing education is one of the most important things you can do to remain at the top of your game.

Knowledge management, in business terms, refers to saving, developing, sharing, and effectively using knowledge for the benefit of organization. It refers to a multi-disciplined approach of achieving organizational objectives by making the best use of knowledge.
Scientia potentia est ...

In their session at DevOps Summit, Asaf Yigal, co-founder and the VP of Product at Logz.io, and Tomer Levy, co-founder and CEO of Logz.io, will explore the entire process that they have undergone – through research, benchmarking, implementation, optimization, and customer success – in ...

The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Da...

It’s time to talk more vociferously about open data.
A better headline for this piece would be: why open data is not an overnight sensation or indeed a turn of a dial or a flick of a switch, i.e., it is not something automatically achieved without some kind of longer term strategic dr...

SYS-CON Events announced today that Logz.io has been named a “Bronze Sponsor” of SYS-CON's @DevOpsSummit Silicon Valley, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Logz.io provides open-source software ELK turned into a log analy...